I'm running an ASA offering Clientless SSL VPN access for remote users and acting as an IPsec Hub site to multiple spokes.
I'd like to set up access to IPsec spokes (CIFS and Web resources) for SSL VPN RA users.
My problem is that all SSL VPN requests are originating with the outside interface public IP address so access currently does not work to IPsec spokes as this doesn't match my cryptomap of course.
Is there a way setting the source interface for SSL VPN requests? Or any other solution I currently don't see to get this design to work?